StudentShare solutions
Triangle menu

Memo - Essay Example

Nobody downloaded yet

Extract of sample

I've prepared an analysis about the use of vulnerability assessment systems and intrusion detection systems in your company, just like you asked me. You specifically asked whether the use of both systems will be a waste of resources and a duplication of efforts. My analysis suggests that VAS and IDS have separate internal functions for the security of the computer systems and both must be a part of a computer system for complete security control.
Vulnerability assessment systems are those security scanning tools that assess level of threat that can penetrate a system. The main job of such tools is to scan networks, servers, firewalls, routers, and applications and report system vulnerabilities. "Generally, the tools can detect known security flaws or bugs in software and hardware, determine if the systems are susceptible to known attacks and exploits, and search for system vulnerabilities such as settings contrary to established security policies". (Becker, 1999)
New threats are discovered each day thus the vulnerability assessment tools must be updated regularly. Any new weaknesses such as security flaws and bugs would need to be patched in the system so that no holes left for malwares, viruses, spywares etc. to infect the system. Another feature of a vulnerability assessment system is that it generates reports which can tell a user what and where weaknesses exist and how to fix them. (Becker, 1999)

Intrusion Detection Systems
Vulnerability assessment is the first step in securing the system from threats by taking appropriate security precautions and patch-ups. However, new threats are raised everyday and some might pass through the vulnerability precautions. Therefore the next logical step is to "monitor the system for intrusions and unusual activities". Intrusion detection systems automatically raise the alarm in case of a security breach and inform the Computer Incident Respond Team for their help. "By analyzing the information generated by the systems being guarded, IDSs help determine if necessary safeguards are in place and are protecting the system as intended". Important to note here is that IDS don't protect the system, they just pinpoint the location of the attack and collect the information related to the attack and the attacker. (Becker, 1999)
IDS tools are used by the CIRT to generate both technical and management reports since it provide background information on the type of attack and the attacker. IDS can also give recommendations to the management about the courses of action to take to seal the breach. (Becker, 1999)

The difference can easily be understood by the following example. Vulnerability assessment just checks how susceptible a person is to catching a cold in winters. The vulnerabilities that the system can find is that not enough warm clothes are worn and heater is not being used. The intrusion detection system checks that cold air in hitting the person directly which may be harmful, and the point of intrusion was the chest of the person. So a person gets the information from the vulnerability system that he needs to have a heater and wear warm clothes and from the intrusion ...Show more
Cite this document
  • APA
  • MLA
(“Memo Essay Example | Topics and Well Written Essays - 2000 words”, n.d.)
Retrieved from
(Memo Essay Example | Topics and Well Written Essays - 2000 Words)
“Memo Essay Example | Topics and Well Written Essays - 2000 Words”, n.d.
  • Cited: 0 times


Up at the St Gregory Country Club, my friend Walter "Wally" Gropius was telling me about how they use intrusion detection systems at MalaFide Corporation where he's the CEO to identify all attacks on their computer networks. So before I approve this request for vulnerability assessment systems, I'd like to understand why we are duplicating efforts here…
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

2. People think that if a regulation exists creating few problems, it should be maintained. A revision should actually take place and it should be analyzed. When nitrates were kept in meat, less people died. If that regulation did not get an analysis, problems
1 pages (250 words) Essay
The manual covers all the steps that are required to be taken to use this audio device. The technical guide writer has ensured that al the important information is provided through the manual and the information provided is most frequently asked by
1 pages (250 words) Essay
Presently, the business division incurs a considerable cost on trash emptying service, which is performed by janitorial staffs who on weekly basis usually pick the trash from the
2 pages (500 words) Essay
The author states that the major aim of contract manufacturing is to save costs, but goes ahead to illustrate that this is only achieved when certain principles of maintaining good
1 pages (250 words) Essay
The memo incorporates the general scope of human resource management and the company’s operations in making its products, productivity applications. The
3 pages (750 words) Essay
3. Of course, the clarity and the readability of this memo could be improved a lot. First, the introduction would be made more detailed to give a brief summary of the entire research. Besides, all the findings
1 pages (250 words) Essay
Being under influence at work negatively impacts effectiveness and productivity of the organization. Random drug screening is a good solution aimed at controlling the way each employee follows ethical guidelines of the company. Screening appointment
1 pages (250 words) Essay
In order to ensure that the world moves to a new phase of appreciating diversity, it is important to introduce school courses that introduce students to the different religions across the globe. Therefore, the course that will be introduced will cover
2 pages (500 words) Essay
As such, she understands every aspect of the project. All she needs to know in this context is the effects the detour is likely to have on the local communities. She, therefore, demands an exhaustive analysis of the local Indonesian
1 pages (250 words) Essay
Thus, it suggests that the gay black did not have any issues with women; hence, better salary was necessary for them. Lisa Wade gives a pictorial description of a woman who seeks to help other women make their men enjoy
1 pages (250 words) Essay
Comments (0)
Click to create a comment
Let us find you another Essay on topic Memo for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us